We have a java application that uses BOXI SDK API’s. As part of fixing security vulnerability, we are trying to use place holders in our SQL statements and would like to know if such a SQL would be supported in BOXI R3.1.
Thanks for your response joepeters. As part of SQL injection fixes (to prevent malicious fiddling of the urls), we would like to convert the following SQL statement:
strQuery = “SELECT * FROM CI_INFOOBJECTS WHERE SI_KIND=‘Category’ AND SI_NAME in (” + categories + “)”
to
strQuery = "SELECT * FROM CI_INFOOBJECTS WHERE SI_KIND=‘Category’ AND SI_NAME in (?,?,?);
Oh, parameters. No, you can’t do that, although it would be very useful.
But honestly there’s not much risk of SQL injection in CMS queries, since there is no UPDATE or DELETE operation, or the ability to retrieve sensitive information, or the ability to submit multiple queries at one time. As long as your parameters are properly escaped, there should be little risk.